A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
Based on (36), with Assumption 1 and Assumption 3, C f b for the f -th file under the proposed hierarchical content delivery strategy is then given by k∈ a d P d ZHENYU ZHONG received the M.E. degree ... ZEYU ZHONG was born in 1990. He received the master's degree in electrical engineering from the Taiyuan University of Technology College. He is currently with State Grid Taiyuan Power Supply Company. ...doi:10.1109/access.2019.2898349 fatcat:yh3axhqptzhfpnnkng4u4sghiu
Simulation-based virtual testing has become an essential step to ensure the safety of autonomous driving systems. Testers need to handcraft the virtual driving scenes and configure various environmental settings like surrounding traffic, weather conditions, etc. Due to the huge amount of configuration possibilities, the human efforts are subject to the inefficiency in detecting flaws in industry-class autonomous driving system. This paper proposes a coverage-driven fuzzing technique toarXiv:2106.00873v1 fatcat:dvms52rkavgxtnepslto35wsba
more »... ally generate diverse configuration parameters to form new driving scenes. Experimental results show that our fuzzing method can significantly reduce the cost in deriving new risky scenes from the initial setup designed by testers. We expect automated fuzzing will become a common practice in virtual testing for autonomous driving systems.
Behcet's disease (BD) is one of the most vision-threatening clinical entities of uveitis. Although the etiopathogenesis of BD remains obscure, accumulating evidence has demonstrated that both genetic and environmental factors may contribute to the development of BD. Genome-wide association studies (GWAS) and candidate association studies have identified several genetic variants strongly associated with BD, including variants in human leukocyte antigen (HLA) -A02, -A03, -A24, -A26, -A31, -B15,doi:10.3389/fopht.2022.916887 fatcat:25q4rlpsyravnowomeghju43k4
more »... 27, -B35, -B49, -B51, -B57, -B58, -C0704, CIITA, ERAP1, MICA, IL1A-IL1B, IL10, IL12, IL23R, IL-23R/IL-12RB2, IL1RL1-IL18R1, STAT4, TFCP2L1, TRAF5, TNFAIP3, CCR1/CCR3, RIPK2, ADO-ZNF365-EGR2, KLRC4, LACC1, MEFV, IRF8, FUT2, CEBPB-PTPN1, ZMIZ1, RPS6KA4, IL10RA, SIPA1-FIBP-FOSL1, VAMP1, JRKL/CTCN5, IFNGR1 and miRNA-146a. Epigenetic modifications are also reported to play essential roles in the development of BD, including DNA methylation and histone modification. We review here the recent advances in the genetic and epigenetic factors associated with the BD pathogenesis.
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise-level mail servers. For example, the dictionary lookups that are characteristic of this approach are limited by the memory access rate, therefore relatively insensitive to increases in CPU speed. We address this scaling issue by proposing an acceleration technique that speeds updoi:10.1145/1140103.1140317 fatcat:wlnbdnsxkzdefhytn3uudtzuzu
more »... ian filters based on approximate classification. The approximation uses two methods: hashbased lookup and lossy encoding. Lookup approximation is based on the popular Bloom filter data structure with an extension to support value retrieval. Lossy encoding is used to further compress the data structure. While both methods introduce additional errors to a strict Bayesian approach, we show how the errors can be both minimized and biased toward a false negative classification. We demonstrate a 6x speedup over two well-known spam filters (bogofilter and qsf) while achieving an identical false positive rate and similar false negative rate to the original filters.
Recent research has proposed the lottery ticket hypothesis, suggesting that for a deep neural network, there exist trainable sub-networks performing equally or better than the original model with commensurate training steps. While this discovery is insightful, finding proper sub-networks requires iterative training and pruning. The high cost incurred limits the applications of the lottery ticket hypothesis. We show there exists a subset of the aforementioned sub-networks that convergearXiv:2003.05733v1 fatcat:zrzuwlgvmzfwxlspws34y5zhqq
more »... tly faster during the training process and thus can mitigate the cost issue. We conduct extensive experiments to show such sub-networks consistently exist across various model structures for a restrictive setting of hyperparameters (e.g., carefully selected learning rate, pruning ratio, and model capacity). As a practical application of our findings, we demonstrate that such sub-networks can help in cutting down the total time of adversarial training, a standard approach to improve robustness, by up to 49% on CIFAR-10 to achieve the state-of-the-art robustness.
Neural networks are known to be vulnerable to carefully crafted adversarial examples, and these malicious samples often transfer, i.e., they maintain their effectiveness even against other models. With great efforts delved into the transferability of adversarial examples, surprisingly, less attention has been paid to its impact on real-world deep learning deployment. In this paper, we investigate the transferability of adversarial examples across a wide range of real-world computer visionarXiv:1905.03333v1 fatcat:hzg5agpi4fae7alxjbeqpr2eki
more »... including image classification, explicit content detection, optical character recognition (OCR), and object detection. It represents the cybercriminal's situation where an ensemble of different detection mechanisms need to be evaded all at once. We propose practical attack that overcomes existing attacks' limitation of requiring task-specific loss functions by targeting on the 'dispersion' of internal feature map. We report evaluation on four different computer vision tasks provided by Google Cloud Vision APIs to show how our approach outperforms existing attacks by degrading performance of multiple CV tasks by a large margin with only modest perturbations.
Inflammation, when properly mounted and precisely calibrated, is a beneficial process that enables the rapid removal of invading pathogens and/or cellular corpses and promotes tissue repair/regeneration to restore homeostasis after injury. Being a paradigm of a rapid response transcription factor, the nuclear factor-kappa B (NF-κB) transcription factor family plays a central role in amplifying inflammation by inducing the expression of inflammatory cytokines and chemokines. Additionally, NF-κBdoi:10.3390/biomedicines10061250 pmid:35740272 pmcid:PMC9219609 fatcat:mgb4i5jl4vdpjd2pgy7f76mxoa
more »... lso induces the expression of pro-survival and -proliferative genes responsible for promoting tissue repair and regeneration. Paradoxically, recent studies have suggested that the NF-κB pathway can also exert inhibitory effects on pro-inflammatory cytokine production to temper inflammation. Here, we review our current understanding about the pro- and anti-inflammatory roles of NF-κB and discuss the implication of its dichotomous inflammation-modulating activity in the context of inflammasome activation and tumorigenesis.
In order to investigate the epitope of basic fibroblast growth factor (bFGF) and its immunogenicity, the epitopes of bFGF were screened from the phage display library with monoclonal antibody GF22, which can neutralize the bio-activity of bFGF. By three rounds of screening, the positive phage clones with bFGF epitopes were selected, which can effectively block the bFGF to bind with GF22. Sequence analysis showed that the epitopes shared a highly conservative sequencedoi:10.5483/bmbrep.2005.38.3.290 fatcat:463cjumv6nanjmt7frcmxwepq4
more »... /Ile-Lys). The sequence of PPGHFK was located at 22-27 of the bFGF. The specific immuno-response of mouse could be highly induced by phage clones with the epitopes. And the anti-bFGF activity induced by LPGHFK was 3 times higher than the original sequence, which showed that the mimetic peptide LPLGHIK might be used as a tumor vaccine in the prevention and treatment of tumor.
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise level mail servers. For example, the dictionary lookups that are characteristic of this approach are limited by the memory access rate, therefore relatively insensitive to increases in CPU speed. We conduct a comprehensive study to address this scaling issue by proposing a series ofdoi:10.1109/tc.2010.92 fatcat:rnojyvcdjjeclmxyvwb5yhgace
more »... cceleration techniques that speed up Bayesian filters based on approximate classifications. The core approximation technique uses hash-based lookup and lossy encoding. Lookup approximation is based on the popular Bloom filter data structure with an extension to support value retrieval. Lossy encoding is used to further compress the data structure. While these approximation methods introduce additional errors to a strict Bayesian approach, we show how the errors can be both minimized and biased toward a false negative classification. We demonstrate a 6x speedup over two well-known spam filters (bogofilter and qsf) while achieving an identical false positive rate and similar false negative rate to the original filters.
Recycling resources from waste can effectively alleviate the threat of global resource strain. Due to the wide variety of waste, relying on manual classification of waste and recycling recyclable resources would be costly and inefficient. In recent years, automatic recyclable waste classification based on convolutional neural network (CNN) has become the mainstream method of waste recycling. However, due to the receptive field limitation of the CNN, the accuracy of classification has reached adoi:10.3390/su132111572 fatcat:6tpg6dc4hvamhcje2viilxm5me
more »... ottleneck, which restricts the implementation of relevant methods and systems. In order to solve the above challenges, in this study, a deep neural network architecture only based on self-attention mechanism, named Vision Transformer, is proposed to improve the accuracy of automatic classification. Experimental results on TrashNet dataset show that the proposed method can achieve the highest accuracy of 96.98%, which is better than the existing CNN-based method. By deploying the well-trained model on the server and using a portable device to take pictures of waste in order to upload to the server, automatic waste classification can be expediently realized on the portable device, which broadens the scope of application of automatic waste classification and is of great significance with respect to resource conservation and recycling.
Integrated Modeling of Complex Optomechanical Systems
Chinese Giant Solar Telescope is the next generation ground based solar telescope of china. Due to the characteristics of ring aperture in polarization detection and thermal control, the current design of CGST is an 8 meter ring solar telescope. The simulation of science cases and the current observations from 1m class solar telescopes indicated the necessity of such a big aperture especially in infrared bands. The integrated simulation of optical system and imaging ability such as opticaldoi:10.1117/12.915792 fatcat:dayx6zn4mzdf7olwtrmq4dh33u
more »... n, MCAO, active maintenance of primary mirror were carried out in this paper. The results of simulation and analysis showed that the current design could meet the demand of most science cases not only in infrared band but also in near infrared band and visible band.
Canine parvovirus (CPV) disease is an acute, highly infectious disease threatening the dog-raising industry. So far there are no effective therapeutic strategies to control this disease. Although the canine transferrin receptor (TfR) was identified as a receptor for CPV infection, whether extracellular domain of TfR (called soluble TfR (sTfR)) possesses anti-CPV activities remains elusive. Here, we used the recombinant sTfR prepared from HEK293T cells with codon-optimized gene structure todoi:10.1155/2013/172479 pmid:24089666 pmcid:PMC3780538 fatcat:nnbnbgpksve6jpw277bptmldqu
more »... tigate its anti-CPV activity bothin vitroandin vivo. Our results indicated that codon optimization could significantly improve sTfR expression in HEK293T cells. The prepared recombinant sTfR possessed a binding activity to both CPV and CPV VP2 capsid proteins and significantly inhibited CPV infection of cultured feline F81 cells and decreased the mortality of CPV-infected dogs, which indicates that the sTfR has the anti-CPV activity bothin vitroandin vivo.
An absorber with a high absorbing efficiency is crucial for X-ray transition edge sensors (TESs) to realize high quantum efficiency and the best energy resolution. Semimetal Bismuth (Bi) has shown greater superiority than gold (Au) as the absorber due to the low specific heat capacity, which is two orders of magnitude smaller. The electroplating process of Bi films is investigated. The Bi grains show a polycrystalline rhombohedral structure, and the X-ray diffraction (XRD) patterns show adoi:10.3390/ma14237169 pmid:34885323 fatcat:4s242h4fcbdm7jdun5nc65g3sm
more »... l crystal orientation of (012). The average grain size becomes larger as the electroplating current density and the thickness increase, and the orientation of Bi grains changes as the temperature increases. The residual resistance ratio (RRR) (R300 K/R4.2 K) is 1.37 for the Bi film (862 nm) deposited with 9 mA/cm2 at 40 °C for 2 min. The absorptivity of the 5 μm thick Bi films is 40.3% and 30.7% for 10 keV and 15.6 keV X-ray radiation respectively, which shows that Bi films are a good candidate as the absorber of X-ray TESs.
We study the intricate relationships between the dynamical scaling properties of electron wave packets and the multifractality of the eigenstates in quantum systems. Numerical simulations for the Harper model and the Fibonacci chain indicate that the root mean square displacement displays the scaling behavior r(t)∼ t^β with β=D_2^ψ, where D_2^ψ is the correlation dimension of the multifractal eigenstates. The equality can be generalized to d-dimensional systems as β=D_2^ψ/d, as long as thearXiv:cond-mat/0011118v1 fatcat:uti57l2ud5ewzcgv5vhxb445ce
more »... ron motion is ballistic in the effective D_2^ψ-dimensional space. This equality should be replaced by β<D_2^ψ/d if the motion is non-ballistic, as supported by all known results.
Zhong 2 , Yougang Zhai 2 , Liang Qiao 2 , Renzhi Han 1 . 1 The OHIO STATE UNIVERSITY, Columbus, OH, USA, 2 Loyola University Chicago, Maywood, IL, USA. ... Further investigation will focus on the mechanisms of Ano5 and Ano6 in this regulatory process. 2128-Pos Board B265 Charged Vesicles Potently Induce NLRP3 Inflammasome Activation Lixia Zhao 1 , Li Xu 1 , Zhenyu ...doi:10.1016/j.bpj.2014.11.2315 fatcat:t6j3twzk7fgszirew6yf4er23q
« Previous Showing results 1 — 15 out of 892 results